Static task
static1
Behavioral task
behavioral1
Sample
easy_Malicious_26a79e61dcddc09b5c34ea8d3d15da745618cd7e1b89c436f48c133d80bcc72f.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
easy_Malicious_26a79e61dcddc09b5c34ea8d3d15da745618cd7e1b89c436f48c133d80bcc72f.exe
Resource
win10v2004-20230703-en
General
-
Target
easy_Malicious_26a79e61dcddc09b5c34ea8d3d15da745618cd7e1b89c436f48c133d80bcc72f.exe
-
Size
25KB
-
MD5
d38848d8c1463873c4aa49403385191d
-
SHA1
ab21b8f695864db232994f668816bbe590bda57c
-
SHA256
d5b67197571ad8d3d1ba6c99a4344c89981054ef290943218e7ca8f76f43f571
-
SHA512
bcee11bfd6e06cf66ad5e3596230219dc199d66a3ca98e81692d1eeb23f325ed362d8ba8575657c9fa0fa85b26abbababa4eb72ee2663a8a6ea3f88654bf8bcd
-
SSDEEP
384:is2GY16KinFHiUeLzOLYlqOB7M1Y9HN1yMihjJayqI2Uqaybm6V21U6EoOOuK+cM:5bKGFHiUCaYNdGjAIjNgm6WLCdh9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource easy_Malicious_26a79e61dcddc09b5c34ea8d3d15da745618cd7e1b89c436f48c133d80bcc72f.exe
Files
-
easy_Malicious_26a79e61dcddc09b5c34ea8d3d15da745618cd7e1b89c436f48c133d80bcc72f.exe.exe windows x86
a13ee0ae6522c4222a0ba64c856f5c87
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathRemoveFileSpecA
StrStrA
StrToIntA
StrChrA
kernel32
GetStartupInfoA
FreeLibrary
InterlockedExchange
Sleep
CreateThread
ExitThread
GetProcAddress
LoadLibraryA
LocalAlloc
lstrcpyA
lstrcpynA
CloseHandle
GetCurrentProcess
ExitProcess
SetFileAttributesA
GetModuleFileNameA
ReleaseMutex
GetLastError
OpenMutexA
WinExec
lstrlenA
lstrcatA
GetTempPathA
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableA
GetShortPathNameA
GetWindowsDirectoryA
WaitForSingleObject
CreateMutexA
CopyFileA
DeleteFileA
GlobalMemoryStatusEx
GetComputerNameA
GetLocaleInfoW
RaiseException
GetTickCount
GetModuleHandleA
TerminateProcess
GetSystemDirectoryA
shell32
ShellExecuteA
ws2_32
WSAStartup
send
select
__WSAFDIsSet
recv
setsockopt
WSAIoctl
htons
socket
connect
closesocket
gethostbyname
inet_addr
sendto
WSASocketA
htonl
dnsapi
DnsRecordListFree
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_controlfp
__setusermatherr
_initterm
rand
srand
time
_except_handler3
_stricmp
_exit
_XcptFilter
exit
_acmdln
__getmainargs
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 944B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ